Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be used such as Ping or net view
using Net.
Adversaries may also analyze data from local host files (ex: C:\Windows\System32\Drivers\etc\hosts
or /etc/hosts
) or other passive means (such as local Arp cache entries) in order to discover the presence of remote systems in an environment.
Adversaries may also target discovery of network infrastructure as well as leverage Network Device CLI commands on network devices to gather detailed information about systems within a network (e.g. show cdp neighbors
, show arp
).[1][2]
ID | Name | Description |
---|---|---|
C0028 | 2015 Ukraine Electric Power Attack |
During the 2015 Ukraine Electric Power Attack, Sandworm Team remotely discovered systems over LAN connections. OT systems were visible from the IT network as well, giving adversaries the ability to discover operational assets. [3] |
C0025 | 2016 Ukraine Electric Power Attack |
During the 2016 Ukraine Electric Power Attack, Sandworm Team checked for connectivity to resources within the network and used LDAP to query Active Directory, discovering information about computers listed in AD.[4] |
S0552 | AdFind |
AdFind has the ability to query Active Directory for computers.[5][6][7][8] |
G1030 | Agrius |
Agrius used the tool NBTscan to scan for remote, accessible hosts in victim environments.[9] |
G1024 | Akira |
Akira uses software such as Advanced IP Scanner and MASSCAN to identify remote hosts within victim networks.[10] |
G0022 | APT3 |
APT3 has a tool that can detect the existence of remote systems.[11][12] |
G0050 | APT32 |
APT32 has enumerated DC servers using the command |
G0087 | APT39 |
APT39 has used NBTscan and custom tools to discover remote systems.[14][15][16] |
G0096 | APT41 |
APT41 has used MiPing to discover active systems in the victim network.[17] |
S0099 | Arp |
Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems.[18][19] |
S0093 | Backdoor.Oldrea |
Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments.[20] |
S1081 | BADHATCH |
BADHATCH can use a PowerShell object such as, |
S0534 | Bazar | |
S0570 | BitPaymer | |
S1070 | Black Basta |
Black Basta can use LDAP queries to connect to AD and iterate over connected workstations.[24] |
S1068 | BlackCat |
BlackCat can broadcasts NetBIOS Name Service (NBNC) messages to search for servers connected to compromised networks.[25] |
S0521 | BloodHound |
BloodHound can enumerate and collect the properties of domain computers, including domain controllers.[26] |
G0060 | BRONZE BUTLER |
BRONZE BUTLER typically use |
C0015 | C0015 |
During C0015, the threat actors used the commands |
S0335 | Carbon | |
G0114 | Chimera |
Chimera has utilized various scans and queries to find domain controllers and remote services in the target environment.[30] |
S0154 | Cobalt Strike |
Cobalt Strike uses the native Windows Network Enumeration APIs to interrogate and discover targets in a Windows Active Directory network.[31][32][33] |
S0244 | Comnie |
Comnie runs the |
S0575 | Conti |
Conti has the ability to discover hosts on a target network.[34] |
S0488 | CrackMapExec |
CrackMapExec can discover active IP addresses, along with the machine name, within a targeted network.[35] |
G0009 | Deep Panda |
Deep Panda has used ping to identify other machines of interest.[36] |
S0659 | Diavol |
Diavol can use the ARP table to find remote hosts to scan.[37] |
G0035 | Dragonfly |
Dragonfly has likely obtained a list of hosts in the victim environment.[38] |
S0694 | DRATzarus |
DRATzarus can search for other machines connected to compromised host and attempt to map the network.[39] |
S1159 | DUSTTRAP |
DUSTTRAP can use |
G1006 | Earth Lusca |
Earth Lusca used the command |
G1003 | Ember Bear |
Ember Bear has used tools such as Nmap and MASSCAN for remote service discovery.[42] |
S0091 | Epic | |
G0053 | FIN5 |
FIN5 has used the open source tool Essential NetTools to map the network and build a list of targets.[44] |
G0037 | FIN6 |
FIN6 used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS.[45] |
G0061 | FIN8 |
FIN8 has used dsquery and other Active Directory utilities to enumerate hosts; they have also used |
S0696 | Flagpro |
Flagpro has been used to execute |
G0117 | Fox Kitten |
Fox Kitten has used Angry IP Scanner to detect remote systems.[49] |
S1044 | FunnyDream |
FunnyDream can collect information about hosts on the victim network.[50] |
C0007 | FunnyDream |
During FunnyDream, the threat actors used several tools and batch files to map victims' internal networks.[51] |
G0093 | GALLIUM |
GALLIUM used a modified version of NBTscan to identify available NetBIOS name servers over the network as well as |
G0125 | HAFNIUM |
HAFNIUM has enumerated domain controllers using |
S0698 | HermeticWizard |
HermeticWizard can find machines on the local network by gathering known local IP addresses through |
G1001 | HEXANE | |
G0119 | Indrik Spider |
Indrik Spider has used PowerView to enumerate all Windows Server, Windows Server 2003, and Windows 7 instances in the Active Directory database.[56] |
S0604 | Industroyer |
Industroyer can enumerate remote computers in the compromised network.[57] |
G0004 | Ke3chang |
Ke3chang has used network scanning and enumeration tools, including Ping.[58] |
S0599 | Kinsing |
Kinsing has used a script to parse files like |
S0236 | Kwampirs |
Kwampirs collects a list of available servers with the command |
G0077 | Leafminer |
Leafminer used Microsoft’s Sysinternals tools to gather detailed information about remote systems.[61] |
G0059 | Magic Hound |
Magic Hound has used Ping for discovery on targeted networks.[62] |
G0045 | menuPass |
menuPass uses scripts to enumerate IP ranges on the victim network. menuPass has also issued the command |
S1146 | MgBot |
MgBot includes modules for performing ARP scans of local connected systems.[65] |
S0233 | MURKYTOP |
MURKYTOP has the capability to identify remote hosts on connected networks.[66] |
G0019 | Naikon |
Naikon has used a netbios scanner for remote machine identification.[67] |
S0590 | NBTscan | |
S0039 | Net |
Commands such as |
S0385 | njRAT | |
S0359 | Nltest |
Nltest may be used to enumerate remote domain controllers using options such as |
S0365 | Olympic Destroyer |
Olympic Destroyer uses Windows Management Instrumentation to enumerate all systems in the network.[73] |
C0012 | Operation CuckooBees |
During Operation CuckooBees, the threat actors used the |
C0014 | Operation Wocao |
During Operation Wocao, threat actors used |
S0165 | OSInfo |
OSInfo performs a connection test to discover remote systems in the network[11] |
S0097 | Ping |
Ping can be used to identify remote systems within a network.[76] |
G1040 | Play |
Play has used tools such as AdFind, Nltest, and BloodHound to enumerate shares and hostnames on compromised networks.[77] |
S0428 | PoetRAT | |
S0650 | QakBot |
QakBot can identify remote systems through the |
S0241 | RATANKBA |
RATANKBA runs the |
S0125 | Remsec | |
S0684 | ROADTools | |
G0106 | Rocke |
Rocke has looked for IP addresses in the known_hosts file on the infected system and attempted to SSH into them.[85] |
G0034 | Sandworm Team |
Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about computers listed in AD.[86][4] |
G1015 | Scattered Spider |
Scattered Spider can enumerate remote systems, such as VMware vCenter infrastructure.[87] |
S0140 | Shamoon |
Shamoon scans the C-class subnet of the IPs on the victim's interfaces.[88] |
S0063 | SHOTPUT |
SHOTPUT has a command to list all servers in the domain, as well as one to locate domain controllers on a domain.[89] |
G0091 | Silence |
Silence has used Nmap to scan the corporate network, build a network topology, and identify vulnerable hosts.[90] |
S0692 | SILENTTRINITY |
SILENTTRINITY can enumerate and collect the properties of domain computers.[91] |
C0024 | SolarWinds Compromise |
During the SolarWinds Compromise, APT29 used AdFind to enumerate remote systems.[92] |
S0646 | SpicyOmelette |
SpicyOmelette can identify payment systems, payment gateways, and ATM systems in compromised environments.[93] |
S0018 | Sykipot |
Sykipot may use |
S0586 | TAINTEDSCRIBE |
The TAINTEDSCRIBE command and execution module can perform target system enumeration.[95] |
G0027 | Threat Group-3390 |
Threat Group-3390 has used the |
G1022 | ToddyCat |
ToddyCat has used |
S0266 | TrickBot | |
G0010 | Turla |
Turla surveys a system upon check-in to discover remote systems on a local network using the |
S0452 | USBferry |
USBferry can use |
G1017 | Volt Typhoon |
Volt Typhoon has used multiple methods, including Ping, to enumerate systems on compromised networks.[101][102] |
S0366 | WannaCry |
WannaCry scans its local network segment for remote systems to try to exploit and copy itself to.[103] |
G0102 | Wizard Spider |
Wizard Spider has used networkdll for network discovery and psfin specifically for financial and point of sale indicators. Wizard Spider has also used AdFind, |
S0248 | yty |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor executed commands and arguments that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. For network devices, monitor executed commands in AAA logs, especially those run by unexpected or unauthorized users. Windows PowerShell log Event ID 4104 (PS script execution) can be used to capture PowerShell script block contents which may contain commands used as a precursor to RDP Hijacking. For example, the following command in a PowerShell script block may be used to enumerate the systems on a network which have RDP access: |
DS0022 | File | File Access |
Monitor for files (such as For Windows, Event ID 4663 (An Attempt Was Made to Access An Object) can be used to alert on access attempts of local files that store host data, including C:\Windows\System32\Drivers\etc\hosts. For Linux, auditing frameworks such as the audit daemon (auditd) can be used to alert on access attempts of local files that store host data, including /etc/hosts. |
DS0029 | Network Traffic | Network Connection Creation |
Monitor for newly constructed network connections associated with pings/scans that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. |
DS0009 | Process | Process Creation |
Monitor for newly executed processes that can be used to discover remote systems, such as |